Cryptographic Hardware and Embedded Systems - CHES 2009

11th International Workshop Lausanne, Switzerland, September 6-9, 2009 Proceedings

  • Christophe Clavier
  • Kris Gaj

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5747)

Table of contents

  1. Front Matter
  2. Software Implementations

    1. Emilia Käsper, Peter Schwabe
      Pages 1-17
    2. Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen, Chen-Mou Cheng, Jintai Ding, Eric Li-Hsiang Kuo et al.
      Pages 33-48
    3. Thomas Eisenbarth, Tim Güneysu, Stefan Heyse, Christof Paar
      Pages 49-64
  3. Invited Talk 1

  4. Side Channel Analysis of Secret Key Cryptosystems

    1. Pierre-Alain Fouque, Gaëtan Leurent, Denis Réal, Frédéric Valette
      Pages 66-80
    2. Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon
      Pages 97-111
    3. Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust
      Pages 112-127
  5. Side Channel Analysis of Public Key Cryptosystems

    1. Thomas Finke, Max Gebhardt, Werner Schindler
      Pages 141-155
  6. Side Channel and Fault Analysis Countermeasures

    1. Jean-Sébastien Coron, Ilya Kizhvatov
      Pages 156-170
    2. Matthieu Rivain, Emmanuel Prouff, Julien Doget
      Pages 171-188
    3. Minoru Saeki, Daisuke Suzuki, Koichi Shimizu, Akashi Satoh
      Pages 189-204
    4. Francesco Regazzoni, Alessandro Cevrero, François-Xavier Standaert, Stephane Badel, Theo Kluter, Philip Brisk et al.
      Pages 205-219
  7. Invited Talk 2

  8. Pairing-Based Cryptography

    1. Jean-Luc Beuchat, Jérémie Detrey, Nicolas Estibals, Eiji Okamoto, Francisco Rodríguez-Henríquez
      Pages 225-239
    2. Junfeng Fan, Frederik Vercauteren, Ingrid Verbauwhede
      Pages 240-253
    3. David Kammler, Diandian Zhang, Peter Schwabe, Hanno Scharwaechter, Markus Langenberg, Dominik Auras et al.
      Pages 254-271

About these proceedings


This book constitutes the refereed proceedings of the 11th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2009, held in Lausanne, Switzerland during September 6-9, 2009.

The book contains 3 invited talks and 29 revised full papers which were carefully reviewed and selected from 148 submissions. The papers are organized in topical sections on software implementations, side channel analysis of secret key cryptosystems, side channel analysis of public key cryptosystems, side channel and fault analysis countermeasures, pairing-based cryptography, new ciphers and efficient implementations, TRNGs and device identification, hardware trojans and trusted ICs, theoretical aspects, and fault analysis.


AES AES-GCM HMAC RSA RSA-CRT block ciphers cluster analysis cryptanalysis elliptic curves fingerprints finite fields random numbers reverse engineering secure processors steganalysis trojans

Editors and affiliations

  • Christophe Clavier
    • 1
  • Kris Gaj
    • 2
  1. 1.Département de Mathématiques et d’InformatiqueUniversité de LimogesLimogesFrance
  2. 2.ECE DepartmentGeorge Mason UniversityFairfaxUSA

Bibliographic information

  • DOI
  • Copyright Information © International Association for Cryptologic Research 2009 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-04137-2
  • Online ISBN 978-3-642-04138-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site